Story image

Burglars using social media to target victims

05 Oct 2015

Various social media platforms have become new tools for burglars, according to a former policeman.

Marsden Hulme, who now sits as general manger for security firm Vivint, says burglars are increasingly using social media to virtually case potential targets, and people should be wary about posting holiday plans online.

Hulme says many people are not as careful as they should be with their personal information, as social media becomes ever more present in modern life.

“By carelessly accepting friend requests or making their posts visible to everyone they can unwittingly provide all the information a would-be-thief could ask for with their social media posts,” he explains.

Hulme says this can cover everything from what high-value purchases they’ve made recently to the dates and times that they’re out off the house.

"Often on holidays we want to share the experiences with friends and family, posting photographs and status updates for the grandparents to see, but all we're doing is letting would be burglars know our movements," he says.

Hulme says other websites like Google Maps allow burglars to see photographs of all the individual houses on a street without ever having to show their faces, letting them gauge security and spot easy access points like side-entrances before arriving on the scene.

"A recent UK survey conducted on burglars showed four out of five of them said they had used social media," he notes.

"One of the criminals surveyed, said that we are “living in the age of the digital criminal" and people are taking advantage of social media to access information about would-be victims.”

Hulme shares the social media behaviours to watch out for:

• Holiday countdowns. Posting that you can’t wait for your trip in a seven days means that the perfect time to rob your house in in eight days.

• Location check-ins. Services like Facebook let you geo-tag yourself, letting would-be thieves know exactly where you when you’re out of the house.

• Photos of the inside of your house: A few photos of your living room and bedrooms can be enough for people to learn the layout of your home, letting them plan a quick in-and-out raid.

• Public RSVPs: Letting the world know that you’re going to a party from 6 - 10pm on July the 29th also lets unscrupulous people know exactly when you’ll be gone from the house.

Seagate: Data trends, opportunities, and challenges at the edge
The development of edge technology and the rise of big data have brought many opportunities for data infrastructure companies to the fore.
Popular Android apps track users and violate Google's policies
Google has reportedly taken action against some of the violators.
How blockchain could help stop video piracy in its tracks
An Australian video tech firm has successfully tested a blockchain trial that could end up being a welcome relief for video creators and the fight against video piracy.
IBM X-Force Red & Qualys introduce automated patching
IBM X-Force Red and Qualys are declaring a war on unpatched systems, and they believe automation is the answer.
Micro Focus acquires Interset to improve predictive analytics
Interset utilises user and entity behavioural analytics (UEBA) and machine learning to give security professionals what they need to execute threat detection analysis.
Raising the stakes: McAfee’s predictions for cybersecurity
Security teams and solutions will have to contend with synergistic threats, increasingly backed by artificial intelligence to avoid detection.
Exclusive: Ping Identity on security risk mitigation
“Effective security controls are measured and defined by the direct mitigation of inherent and residual risk.”
CylancePROTECT now available on AWS Marketplace
Customers now have access to CylancePROTECT for AI-driven protection across all Windows, Mac, and Linux (including Amazon Linux) instances.